Exam 8: Securing Information Systems
Exam 1: Information Systems in Global Business Today90 Questions
Exam 2: Global E-Business and Collaboration90 Questions
Exam 3: Information Systems, Organizations, and Strategy90 Questions
Exam 4: Ethical and Social Issues in Information Systems90 Questions
Exam 5: It Infrastructure and Emerging Technologies90 Questions
Exam 6: Foundations of Business Intelligence: Databases and Information Management90 Questions
Exam 7: Telecommunications, the Internet, and Wireless Technology89 Questions
Exam 8: Securing Information Systems90 Questions
Exam 9: Achieving Operational Excellence and Customer Intimacy: Enterprise Applications90 Questions
Exam 10: E-Commerce: Digital Markets, Digital Goods90 Questions
Exam 11: Managing Knowledge90 Questions
Exam 12: Enhancing Decision Making89 Questions
Exam 13: Building Information Systems90 Questions
Exam 14: Managing Projects90 Questions
Exam 15: Managing Global Systems90 Questions
Select questions type
Which of the following is not an example of a computer used as an instrument of crime?
Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
D
Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.
Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
A
DoS attacks are used to destroy information and access restricted areas of a company's information system.
Free
(True/False)
4.9/5
(34)
Correct Answer:
False
________ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else.
(Multiple Choice)
4.8/5
(37)
In a client/server environment, corporate servers are specifically vulnerable to
(Multiple Choice)
4.8/5
(39)
How do software vendors correct flaws in their software after it has been distributed?
(Multiple Choice)
4.8/5
(40)
Wireless networks are more difficult for hackers to gain access too because radio frequency bands are difficult to scan.
(True/False)
4.9/5
(43)
The communications lines in a client/server environment are specifically vulnerable to
(Multiple Choice)
4.7/5
(38)
Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports.
(True/False)
5.0/5
(37)
NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs.
(True/False)
4.7/5
(45)
Explain how an SQL injection attack works and what types of systems are vulnerable to this type of attack.
(Essay)
4.8/5
(32)
________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors.
(Multiple Choice)
4.9/5
(33)
Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.
(True/False)
4.8/5
(38)
You have just been hired as a security consultant by MegaMalls Inc., a national chain of retail malls, to make sure that the security of their information systems is up to par. Outline the steps you will take to achieve this.
(Essay)
4.8/5
(35)
Smaller firms may outsource some or many security functions to
(Multiple Choice)
4.9/5
(40)
________ is malware that logs and transmits everything a user types.
(Multiple Choice)
4.8/5
(40)
An acceptable use policy defines the acceptable level of access to information assets for different users.
(True/False)
4.9/5
(45)
Showing 1 - 20 of 90
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)